Malware
Rootkit
Also known as: Stealth kit, Root-level malware
Definition
Stealth malware that grants and hides privileged access to an operating system or device, evading detection by standard tools.
Examples
- TDL/TDSS, a long-lived kernel-mode rootkit family targeting Windows.
- ZeroAccess, used to hide click-fraud and Bitcoin-mining payloads.
Related terms
Bootkit
Malware that infects the boot process — MBR, VBR, or UEFI — to load before the operating system and obtain persistent, privileged control.
UEFI Rootkit
A rootkit implanted in UEFI firmware that loads before the OS, persists across disk wipes, and bypasses most endpoint security.
BIOS Rootkit
A rootkit that infects legacy BIOS firmware so it executes before the operating system, achieving deep persistence below the OS.
Stealth Malware
Malware specifically engineered to evade detection by users, security tools, and forensic investigators through hiding, mimicry, and anti-analysis tricks.
Firmware Malware
Malicious code that lives in device firmware — BIOS/UEFI, network cards, drives, or peripherals — surviving OS reinstalls and most endpoint defences.
Malware
Any software intentionally designed to disrupt, damage, or gain unauthorized access to computers, networks, or data.